61w ago - It's been awhile since the last IDPS update, and today I've created this PS3 IDPS Viewer homebrew application based on research I'm doing and had not planned to release the tool out yet, but if someone needs it here it is (Thanks to J-Martin for the logo).
When the program starts you will see the typical intro screen, if you choose "Yes" you will see the data from your PS3, if sounds three beeps indicates that it was not possible dump and show the error message, and if all went well sounds a beep and you are able to see the data.
Automatically saves the IDPS in dev_hdd0/IDPS.bin, you must open it with a hex editor and look hexadecimal values, for example (IDPS false, I will not reveal my IDPS):
00 00 00 01 00 85 00 05 87 15 A4 4D 47 64 F6 AA
The IDPS in this case would be: 00 00 00 01 00 85 00 May 87 47 64 15 A4 F6 4D AA
It has been tested on PS3 FAT, SLIM should work perfectly in also.
Finally, in related news PlayStation 3 developer naehrwert has recently blogged (nwert.wordpress.com/2011/12/24/individual-infos/) about PS3 Individual Infos, to quote:
One of the PS3′s console specific cryptography works as follows:
At factory time there is a console specific key generated, probably from a private constant value and a console specific seed. Maybe that’s the key used for encrypting bootldr and metldr. Fact is, that metldr stores another console specific keyset (key/iv) to LS offset 0x00000.
That keyset is probably calculated from the first one. At factory time the isolated root keyset (how I call it) is used to encrypt the console’s “Individual Infos”, like eEID. But not the whole eEID is encrypted the same way, special seeds are used to calculate key/iv pairs for the different sections.
And not even that is true for every eEID section, because for e.g. EID0 another step is needed to generate the final section key(set). Each of the isolated modules using such an “Individual Info” has a special section that isoldr uses to generate the derived key(set)s.
But the generation works in a way, that the section data is encrypted with aes-cbc using the isolated root keyset, so it is not possible to calculate the isolated root keyset back from the derived key(set)s, because aes shouldn’t allow a known plaintext attack.
So far I can decrypt some of EID0′s sections, EID1, EID2 and EID4. EID5 encryption should be similar to EID0′s but I lack the generation keys for that one.
Stay tuned for more PS3 Hacks and PS3 CFW news, follow us on Twitter and be sure to drop by the PS3 Hacks and PS3 Custom Firmware Forums for the latest PlayStation 3 scene updates and homebrew releases!
No offense to you but what are your issues about having this release? this is not a competition or something like that. In the end what the end user choose to do with this tool is up to the end user choice so what is the point about always questioning the purpose of this tool when it's obviously clear what you can do with this and what you cannot?
Hell CFW why can't you just keep quite once in a while instead on rambling and dissing others ? You want to be respected from each and everyone if one follows your posts carefully, but in the same moments you bash onto others in a sort of "friendly" manner. Anyway even your friendly phrases are annoying most of the time.
You are also talking that ALL they guys who do at least put out some stuff are stupid with doing the work they do because NO one needs this stuff. Maybe some guys do it for for fun, some things are just playstuff and wont be useful for anyone that doesn't mean YOU have to bash around telling them "god are you stupid go away with your useless stuff".
We don't tell you to shut up and stay away with your useless ramblings, you just show some silly videos with horrible english... showing nothing much at all !!!! and go on how easy most of the stuff would be, that YOU can do this YOU know that others cant do this can't do that... but all that comes up from you is nothing more then putting out crap at others in one way or another.
You compare math with nabnab and expect they are the same... if one would read carefully one could see that the english nabnab uses differs not that much from yours... so i would suggest you and nabnab are the same... but that would be well acting like yourself, and thats something that is not needed anywhere i would suppose. Why can't you just be quiet if you think that something is not worthy of YOU... maybe others like that stuff.
And it gets boring to read weeks after weeks that you are accomplishing so much without showing any real facts or results in that matter... Remember that you said quite a while ago ..month i assume that BETA of your so long estimated CFW will be out in 2 WEEKS... well looks like that hot air...
Now you say your work on retail to full debug...well all that comes is talk with some info one could google with a brain ! And you go on at others what the heck they do ? that they do nothing ? well they have at least something not just talk talk talk... and they don't get at you saying things like that do they ?
And the PS3 is not for everyone just a GAMING console... maybe you should wake up yourself that not all kids want to play only !
if you would know what a real hacker would say bout that bs.... a hack modifies something to the extent that it does something it couldn't do before... in the case of gamingconsoles one thing is MAYBE playing games !... but thats ONLY one thing.
Portalcake pls keep away with this warez BS. This is a Video Gaming Console HACK scene. It's not a tablet hacking scene, it's also not a smart phone hacking szene. The key word is Video GAMING Console Hack scene. And even in the smart phone hacking scene you have warez in case of applications and games it self.
Then also pls keep away with rebug. Even if you change the to time change able 2 idps's and run a dex kernel on rebug... you can't use the debugger mode, you cant use target manager, you can't use the special downgrader pup's and jump between FW's as you want, you can't use BD EMU,... should i go on ??
About the metldr exploit you mentoined: You even know that this exploit is an hardware exploit ? So you need first to find out the test points on the ps3's mainboard to inject the metldr to the SPU's Local Storage directly. Do you knowed that ? Im guess not otherwise you wouldn't talk like that.
So TRUST ME if i tell you that you would have more fun with a bootloader exploit, which is actually done and ready for release but not pulically, then with your mentoined metldr exploit.
To Blade86 No its not fake but it is only the half of the truth. I get hands on a eEID of a console that got converted and i have the eEID before and after converting to debug. So i know which EID segments have changed and what need to do.
I to time also have a debug console at home that even can play BD Movies. Any one have think about that some companys produce or develope BD Movies for Sony and that they need a debug console that can play Movies ?
I have successful moddified anergistic to accept external per_console_keys and external EID segments for testing purpose. Also i have reversed some of the ps3 modules and know the non puplic eidx_iv's needed in conclution with PCK to decrypt and encrypt specific EID segments.
Actually im working on a windows app to do all that stuff for the end user. Cause even if you can decrypt EID segments with your PCK and the non puplic eidx_iv's with the aim_spu_module.elf you cant re-encrypt them. But you can do that all on a pc if you know what to do.
If you dont believe me just hunt and search for a request_idps.txt and load it into a hex editor and you will see that it is a bit more then just patching 2 idps's.